Maloth Sagar

Work place: Maloth Sagar School of Information Technology and Engineering, Vellore Institute of Technology (VIT UNIVERSITY), Vellore, TamilNadu, India-632014

E-mail: maloth.sagar2019@vitstudent.ac.in

Website:

Research Interests: Information Security, Hardware Security, Computer systems and computational processes, Network Security, Data Structures and Algorithms

Biography

Maloth Sagar received the Master of Technology degree from Jawaharlal Technological University Hyderabad in 2016. He is currently working towards Ph.D Degree in Deep Learning at Vellore Institute of Technology (VIT UNIVERSITY), Vellore. His main research interest includes cyber-physical systems, Deep learning and cyber security.

Author Articles
Attacks on Cyber Physical System: Comprehensive Review and Challenges

By Maloth Sagar Vanmathi C.

DOI: https://doi.org/10.5815/ijwmt.2022.05.06, Pub. Date: 8 Oct. 2022

CPS is often comprised of several networked systems that could really observe as well as modify real-world objects and operations. They're analogous with IoT systems, and that therefore CPS concentrates mostly on interplay of mechanical, communications, as well as compute operations. As a result of their connection with IoT, a truly innovative CPS element, the “Internet of Cyber-Physical Things (IoCPT)”, has been established. The speedy pace and substantial development of CPS does have a consequence upon several parts of people's lives and permits a plethora of services and applications, including such e-Health, home automation, and e-Commerce. Interlinking the physical and virtual realms, on the other hand, poses additional security risks. As a necessary consequence, CPS cyber-security increasingly piqued the interest of both academics as well as corporations. In this research work, a literature review has been undergone in terms of cyber security in cyber physical systems. All the literature papers on cyber security have been collected from standard journals like IEEE, Springer and Elsevier. The collected papers are analyzed in diverse aspects like application, dataset used, technique utilized, tool and performance recorded. Finally, the research gaps identified is manifested to guide the future researchers on intrusion detection in CPS.

[...] Read more.
Other Articles